Website URL

Twitter

Mastodon

AIM

MSN

ICQ

Yahoo

XMPP / Jabber

Skype

Location

Interests

If my Qbittorent is set up so that it only uses the TAP-9 adapter and my AIRVPN IP can I still leak my IP and get a possible DMCA? When I was setting Qbittorent up with AIRVPN it took me a while to get it to properly connect to just the VPN and nothing else but I am still paranoid as I have received DMCA's before. I have Qbittorent restricted to only use the IP Airvpn gave me and only have it set to allow the TAP-9 adapter but can I still leak?

Hello, first post here. I was really getting interested in hiding my IP from websites, and suddenly I noticed this issue: whatever I do the site whatsmyip always detects my real ISP given IP and location. I did some reading and tests, but all posts and topics related to IP leak lead to WEBRTC, that was the first fix I did - disabling this service on my browsers, however that didn't solve my problem, although all WEBRTC testing sites confirmed that I have successfully disabled the service. Then I changed my DNS, connected to various AirVPN servers, no change, that site is always showing my real IP (it's IPv6 if it matters) So, if anyone can explain this and possibly gives me an idea what to try next, it will be appreciated! using Win10-64, Chrome and Firefox browsers. Cheers! Waylander131

Hi there, I use a Fritzbox 6490 with the current OS 6.63. My goal is to set-up the firewall of the Fritzbox in a way that only AirVPN internet traffic is allowed and everything else blocked. Can you please help and describe how to set-up the Fritzbox? ​ ​ ​

I've recently purchased AirVPN and set up the client for usage with two windows devices, however I'm having issues with one of my Linux systems. In the first instance, when trying to install the client via the package installer, I received the message: Error: Dependency is not satisfiable: "libmono-system-runtime2.0-cil" ... Since I couldn't use the installer, I downloaded the mobile client instead. Everything seemed to be running smoothly, except when I ran a check on ipleak.net, I found that my UK details were displayed along with the foreign IP from the VPN. My accurate location was also shown on the Google Maps image at the bottom of the screen. This is not the case with either of my windows devices. In the windows instances, the only addresses and locations shown are those coming from the VPN. Also, the ipleaks check reads: "AirVPN Exit Node: No." With both my windows devices, this section reads: "AirVPN Exit Node: Yes." Forgive me if I sound foolish, but I really am confused as to what the issue could be. Any help would be greatly appreciated.

Hey, I am currently in the UK and using Air VPN through a Prague server. However, when I do an ipleak test on www.doileak.com the site shows me as having a Parague IP address but then seems to know I am in the UK. it doesn't reveal my actual IP address but as you can see it suggests I am in the UK. IP leak report below...Please can anybody explain what I am doing wrong? How can site know that I am in the UK? How can I stop my IP address from leaking like this? Request IP: 89.238.166.235, M247 Ltd Dedicated Servers (9009), United Kingdom (EU)If you are using a proxy it seems to be an anonymous HTTP or a socks proxy. Before running further tests, we get your request IP - what you show to the internet at large. This test shows if you’re using a visible proxy, for example if you are connected through a company or university’s internet service. An anonymous proxy will not be detected by this test, but the other tests on this page could help to detect if you are using one. This also tests if you’re arriving from a TOR exit node. This won’t reveal your identity, but websites can block traffic from TOR users as they assume you have something to hide. Operating System:Windows Same results for all tests. Browser:Firefox Same results for all tests. Connection type:We could not detect your connection type. Timezone Difference:The time zone of your browser settings and the time zone of your request IP location match. DNS Request Source:We did get DNS requests from the following IPs: 89.238.166.235: M247 Ltd Dedicated Servers (9009), United Kingdom (EU)Your DNS configuration seems to be ok. All your DNS request(s) came from the same network as your HTTP request (or from anonymous DNS servers). IPv6 Request Source:We were not able to detect an IPv6 request. SSL traffic:89.238.166.235 WebRTC IP Leak:We could not detect an IP via WebRTC. Flash support:Your browser has Flash disabled. WebGL support:WebGL detected, but it is disabled. SSL Setup Security:Probably Ok Third party cookies:Not supported HTTP Request Leaks: We could not find any HTTP request type leaks.

Dear Airvpn Admin,
Please kindly help to resolve this issue.
https://www.perfect-privacy.com/blog/2015/11/26/ip-leak-vulnerability-affecting-vpn-providers-with-port-forwarding/
http://thehackernews.com/2015/11/vpn-hacking.html
IP leak affecting VPN providers with port forwarding
Perfect Privacy, 26. November 2015
Vulnerability “Port Fail” reveals real IP address
We have discovered a vulnerability in a number of providers that allows an attacker to expose the real IP address of a victim. “Port Fail” affects VPN providers that offer port forwarding and have no protection against this specific attack. Perfect Privacy users are protected from this attack.
This IP leak affects all users: The victim does not need to use port forwarding, only the attacker has to set it up.
We have tested this with nine prominent VPN providers that offer port forwarding. Five of those were vulnerable to the attack and have been notified in advance so they could fix this issue before publication. However, other VPN providers may be vulnerable to this attack as we could not possibly test all existing VPN providers.

I've been trying to figure out where I need to insert these rules. #!/bin/sh iptables -I FORWARD -i br0 -o tun0 -j ACCEPT iptables -I FORWARD -i tun0 -o br0 -j ACCEPT iptables -I FORWARD -i br0 -o vlan2 -j DROP iptables -I INPUT -i tun0 -j REJECT iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE On my router I used WINScp to create a firewall-start file on the /jffs directory but this script didnt work for some reason whenever I turn off the VPN my internet reverts back to clear net which I want to prevent. Am I even creating the right file? Is it supposed to be in the firewall-start file or another file. I've seen another user ask about this but their wasn't a reply. Thanks for the help.